Visible to the public Cracking IoT Device User Account via Brute-force Attack to SMS Authentication Code

TitleCracking IoT Device User Account via Brute-force Attack to SMS Authentication Code
Publication TypeConference Paper
Year of Publication2018
AuthorsWang, Dong, Ming, Jiang, Chen, Ting, Zhang, Xiaosong, Wang, Chao
Conference NameProceedings of the First Workshop on Radical and Experiential Security
Date PublishedMay 2018
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5757-9
Keywordsbrute-force attack, composability, defense, IoT device, Metrics, pubcrawl, resilience, Resiliency, Router Systems Security, SMS authentication code, user account, Zero day attacks
Abstract

IoT device usually has an associated application to facilitate customers' interactions with the device, and customers need to register an account to use this application as well. Due to the popularity of mobile phone, a customer is encouraged to register an account with his own mobile phone number. After binding the device to his account, the customer can control his device remotely with his smartphone. When a customer forgets his password, he can use his mobile phone to receive a verification code that is sent by the Short Message Service (SMS) to authenticate and reset his password. If an attacker gains this code, he can steal the victim's account (reset password or login directly) to control the IoT device. Although IoT device vendors have already deployed a set of security countermeasures to protect account such as setting expiration time for SMS authentication code, HTTP encryption, and application packing, this paper shows that existing IoT account password reset via SMS authentication code are still vulnerable to brute-force attacks. In particular, we present an automatic brute-force attack to bypass current protections and then crack IoT device user account. Our preliminary study on popular IoT devices such as smart lock, smart watch, smart router, and sharing car has discovered six account login zero-day vulnerabilities.

URLhttps://dl.acm.org/doi/10.1145/3203422.3203426
DOI10.1145/3203422.3203426
Citation Keywang_cracking_2018